Login / Signup
Security study on three modes of connection for a connected car.
Jellid Kawtar
Tomader Mazri
Published in:
SCA (2018)
Keyphrases
</>
statistical analysis
empirical studies
theoretical framework
real time
electronic commerce
experimental study
hong kong
security policies
security requirements
computer security